Ibne Hossain et al., 2020 - Google Patents
Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: A system of systems problemIbne Hossain et al., 2020
View HTML- Document ID
- 7100067733454716066
- Author
- Ibne Hossain N
- Nagahi M
- Jaradat R
- Shah C
- Buchanan R
- Hamilton M
- Publication year
- Publication venue
- Journal of Computational Design and Engineering
External Links
Snippet
Due to the widespread of new technologies, the modern electric power system has become much more complex and uncertain. The Integration of technologies in the electric power system has increased the exposure of cyber threats and correlative susceptibilities from …
- 238000000034 method 0 abstract description 50
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ibne Hossain et al. | Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: A system of systems problem | |
Nafees et al. | Smart grid cyber-physical situational awareness of complex operational technology attacks: A review | |
Ye et al. | A review of cyber–physical security for photovoltaic systems | |
Knowles et al. | A survey of cyber security management in industrial control systems | |
Qi et al. | Cybersecurity for distributed energy resources and smart inverters | |
Kure et al. | Assets focus risk management framework for critical infrastructure cybersecurity risk management | |
Johnson | Roadmap for photovoltaic cyber security | |
Ray et al. | Smart power grid security: A unified risk management approach | |
Campbell | Cybersecurity issues for the bulk power system | |
Cassottana et al. | Resilience analysis of cyber‐physical systems: A review of models and methods | |
Genge et al. | A framework for designing resilient distributed intrusion detection systems for critical infrastructures | |
Abdelkader et al. | Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks | |
Singh et al. | Analysis and evaluation of cyber-attack impact on critical power system infrastructure | |
Baig et al. | Cyber-Security Risk Assessment Framework for Critical Infrastructures. | |
Alrumaih et al. | Cyber resilience in industrial networks: A state of the art, challenges, and future directions | |
Sen et al. | On using contextual correlation to detect multi-stage cyber attacks in smart grids | |
Henry et al. | Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations | |
Almutairy et al. | Detection and mitigation of gps spoofing attacks on phasor measurement units using deep learning | |
Lydia et al. | Securing the cyber-physical system: A review | |
Venkataramanan et al. | Enhancing microgrid resiliency against cyber vulnerabilities | |
Landen et al. | DRAGON: Deep reinforcement learning for autonomous grid operation and attack detection | |
Achaal et al. | Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges | |
Aslam et al. | Scrutinizing security in industrial control systems: An architectural vulnerabilities and communication network perspective | |
Ellinas et al. | Critical infrastructure systems: Basic principles of monitoring, control, and security | |
Syrmakesis et al. | Cyber resilience methods for smart grids against false data injection attacks: categorization, review and future directions |